Description
In Apache CouchDB, a malicious user with permission to create documents in a database is able to attach a HTML attachment to a document. If a CouchDB admin opens that attachment in a browser, e.g. via the CouchDB admin interface Fauxton, any JavaScript code embedded in that HTML attachment will be executed within the security context of that admin. A similar route is available with the already deprecated _show and _list functionality. This privilege escalation vulnerability allows an attacker to add or remove data in any database or make configuration changes. This issue affected Apache CouchDB prior to 3.1.2
Published: 2021-10-14
Score: 7.3 High
EPSS: 9.0% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-04T01:37:16.335Z

Reserved: 2021-08-09T00:00:00.000Z

Link: CVE-2021-38295

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-10-14T20:15:09.017

Modified: 2024-11-21T06:16:44.313

Link: CVE-2021-38295

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-10-12T00:00:00Z

Links: CVE-2021-38295 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses